First published: Tue Feb 23 2016(Updated: )
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=7.0.0<=7.0.65 | 7.0.66 |
maven/org.apache.tomcat:tomcat | >=8.0.0.RC1<=8.0.30 | 8.0.31 |
maven/org.apache.tomcat:tomcat | =9.0.0.M1 | 9.0.0.M2 |
Apache Tomcat | =7.0.0-beta | |
Apache Tomcat | =7.0.2-beta | |
Apache Tomcat | =7.0.4-beta | |
Apache Tomcat | =7.0.5-beta | |
Apache Tomcat | =7.0.6 | |
Apache Tomcat | =7.0.10 | |
Apache Tomcat | =7.0.11 | |
Apache Tomcat | =7.0.12 | |
Apache Tomcat | =7.0.14 | |
Apache Tomcat | =7.0.16 | |
Apache Tomcat | =7.0.19 | |
Apache Tomcat | =7.0.20 | |
Apache Tomcat | =7.0.21 | |
Apache Tomcat | =7.0.22 | |
Apache Tomcat | =7.0.23 | |
Apache Tomcat | =7.0.25 | |
Apache Tomcat | =7.0.26 | |
Apache Tomcat | =7.0.27 | |
Apache Tomcat | =7.0.28 | |
Apache Tomcat | =7.0.29 | |
Apache Tomcat | =7.0.30 | |
Apache Tomcat | =7.0.32 | |
Apache Tomcat | =7.0.33 | |
Apache Tomcat | =7.0.34 | |
Apache Tomcat | =7.0.35 | |
Apache Tomcat | =7.0.37 | |
Apache Tomcat | =7.0.39 | |
Apache Tomcat | =7.0.40 | |
Apache Tomcat | =7.0.41 | |
Apache Tomcat | =7.0.42 | |
Apache Tomcat | =7.0.47 | |
Apache Tomcat | =7.0.50 | |
Apache Tomcat | =7.0.52 | |
Apache Tomcat | =7.0.53 | |
Apache Tomcat | =7.0.54 | |
Apache Tomcat | =7.0.55 | |
Apache Tomcat | =7.0.56 | |
Apache Tomcat | =7.0.57 | |
Apache Tomcat | =7.0.59 | |
Apache Tomcat | =7.0.61 | |
Apache Tomcat | =7.0.62 | |
Apache Tomcat | =7.0.63 | |
Apache Tomcat | =7.0.64 | |
Apache Tomcat | =7.0.65 | |
Apache Tomcat | =8.0.0-rc1 | |
Apache Tomcat | =8.0.0-rc10 | |
Apache Tomcat | =8.0.0-rc3 | |
Apache Tomcat | =8.0.0-rc5 | |
Apache Tomcat | =8.0.1 | |
Apache Tomcat | =8.0.3 | |
Apache Tomcat | =8.0.11 | |
Apache Tomcat | =8.0.12 | |
Apache Tomcat | =8.0.14 | |
Apache Tomcat | =8.0.15 | |
Apache Tomcat | =8.0.17 | |
Apache Tomcat | =8.0.18 | |
Apache Tomcat | =8.0.20 | |
Apache Tomcat | =8.0.21 | |
Apache Tomcat | =8.0.22 | |
Apache Tomcat | =8.0.23 | |
Apache Tomcat | =8.0.24 | |
Apache Tomcat | =8.0.26 | |
Apache Tomcat | =8.0.27 | |
Apache Tomcat | =8.0.28 | |
Apache Tomcat | =8.0.29 | |
Apache Tomcat | =9.0.0-milestone1 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Canonical Ubuntu Linux | =16.04 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Apache Tomcat | =9.0.0-m1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.